References
[1]. Abrams, L. (2004). The hosts file and what it can do for you. Retrieved from http://www.bleepingcomputer.com/ tutorials/ hosts-files-explained/
[2]. Achenbach, J. (2015, December 10). Researchers create a computer program that learns the way humans do. The Washington Post. Retrieved from https://www.washingtonpost.com/news/speaking-of-science/ wp/2015/12/10/ researchers-create-a-computer- program- that-learns-the-way-humans-do/ ?utm_term=. c43cd13cd536
[3]. Anderson, J. (1997). Guidelines for indexes and related information retrieval devices [White paper]. Retrieved from National Information Standards Organization: http://www.niso.org/publications/tr/tr02.pdf
[4]. Anjali, M., & Babu, P. (2014, October). Ambiguities in natural language processing. International Journal of Innovative Research in Computer and Communication Engineering, 2(5), 392-394.
[5]. Aquin, L., & Ling, X. (2014). An outlier mining algorithm based on attribute entropy and weighted cosine similarity. Journal of Taiyuan University of Science and Technology.
[6]. Assiotis, M., & Tzanov, V. (2005). A distributed architecture for massive multiplayer onlinerole-playing games (Master's Thesis). Retrieved from http://pdos.csail. mit.edu/6.824-2005/reports/assiotis.pdf
[7]. Baker, M. (1994). Fast crash recovery in distributed file system (Doctoral Dissertation, University of California Berkeley).
[8]. Berg, R., Hemphill, R., Abella, B., Aufderheide, T., Cave, D., Hazinski, M., Rea, T. (2010). Basic life support. American Heart Association Guide lines for Cardiopulmonary Resuscitation and Emergency Cardiovascular Care, 685-705. https://doi.org/10.1161/ CIRCULATIONAHA.110.970939
[9]. Borysowich, C. (2010, September 21). Network architecture types [Blog post]. Retrieved from http://it.toolbox.com/blogs/enterprise-solutions/networkarchitecture- types-41375
[10]. Brafman, R., & Tennenholtz, M. (2002, October). R-max – a general polynomial time algorithm for near-optimal reinforcement learning. Journal of Machine Learning Research, 3(1), 213-231.
[11]. Brown, M. H. (1991). Zeus: A system for algorithm animation and multi-view editing. Proceedings 1991 IEEE Workshop on Visual Languages(pp. 4-9). DOI: 10.1109/WVL.1991.238857
[12]. Cao, X., Chen, J., Xiao, Y., & Sun, Y. (2012). Building environment control with wireless sensor and actuator networks: Centralized vs distributed. IEEE Transactions on Industrial Electronics, 57(11),3596-3605. DOI: 10.1109/TIE.2009.2029585
[13]. Chesney, D. (2004). Brute force algorithms greedy algorithms [PowerPoint slides]. Retrieved from https://www.eecs.umich.edu/courses/eecs281/f04/lecnot es/25-greedybrute.pdf
[14]. Christensen, L., Johnson, R., & Turner, L. (2011). Research Methods, Design, and Analysis (11th Ed.). Boston, MA: Allyn & Bacon.
[15]. Cunningham, K. (2014, January 6). Python and your phone: Let's talk about Kivy. Inform IT. Retrieved from http://www.informit.com/articles/article.aspx?p=2170160
[16]. DeNero, J. (2011). Distributed and parallel computing [Lecture notes]. Retrieved from http://wla.berkeley.edu/~cs61a/fa11/lectures/ communication.html
[17]. Devadas, S. (2009). Lecture 18: Dynamic programming I: Memoization, Fibonacci, crazy eights [Lecture notes]. Retrieved from MIT Computer Science and Artificial Intelligence Laboratory: courses.csail.mit.edu/ 6.006/fall09/lecture_notes/lecture18.pdf
[18]. Dickhausa, T., & Royen, T. (2015). A survey on multivariate chi-square distributions and their applications in testing multiple hypotheses. Statistics, 49(2), 427-454. https://doi.org/10.1080/02331888.2014.993639
[19]. Flage, R., & Avan, T. (2008). Expressing and communicating uncertainty in relation to quantitative risk analysis. Reliability & Risk Analysis: Theory & Application, 2(13), 9-18.
[20]. Geise, H., Burmester, S., Klein, F., Schilling, D., & Tichy, M. (2003). Multi-agent system design for safety-critical self-optimizing mechatronic systems with UML. Proceedings of the 2nd Workshop on Agent-Oriented Methodologies. Retrieved from http://www-old.cs.uni-paderborn.de/ uploads/tx_sibibtex/OOPSLA2003_AOM.pdf
[21]. Grunkemeier, G., & MPhil, N. (2002, December). Bayesian analysis: A new statistical paradigm for new technology. The Annals of Thoracic Surgery, 74(6), 1901- 1908. https://doi.org/10.1016/S0003-4975(02)04535-6
[22]. Gupta, A. (2013, January). Fourier transform and its application in cell phones. International Journal of Scientific and Research Publications, 3(1), 1-2.
[23]. Kim, S., Oh, S., & Cho, K. (2017). Development of machine learning models for diagnosis of glaucoma. PLoS One, 12(5). https://doi.org/10.1371/journal.pone.0177726
[24]. Kingsford, C. (2012). Dynamic programming [Lecture notes]. Retrieved from Computer Science University of Maryland: https://www.cs.cmu.edu/~ckingsf/bioinfolectures/ dynamicp.pdf
[25]. Kossiakoff, A., Sweet, W., Seymour, S., & Biemer, S. (2011). Systems Engineering Principles and Practice (2nd Ed.). Hoboken, NJ: John Wiley & Sons, Inc.
[26]. Levitin, A. (2007). Introduction to the Design and Analysis of Algorithms (2nd Ed.). Retrieved from www.cs.ucr.edu/~jiang/cs141/ch06n.ppt
[27]. Luan, W. (2011, June 6). Parallel feeder operation scheme based on distributed automation logic. 21st International Conference on Electricity Distribution. Retrieved from https://pdfs.semanticscholar.org/3fbd/ 83911532acac45a378d741f873080631d96f.pdf
[28]. Nigam, S. (2009). Choosing the best algorithm strategies for a particular problem (Master's Thesis, Thapar University).
[29]. Rosen, B. (2009). Hopfield network [Lecture notes]. Retrieved from UCLA Engineering Computer Science Department: http://web.cs.ucla.edu/~rosen/161/notes/ hopfield.html
[30]. Peng, T. S., & Jun, Z. (2011, August). A research on multi agent modeling language. Procedia Engineering, 15(1), 1842-1847. https://doi.org/10.1016/j.proeng.2011. 08.343
[31]. Sinclair, A. (2011). Randomness & computation [PowerPoint slides]. Retrieved from https://people.eecs. berkeley.edu/~sinclair/cs271/n3.pdf
[32]. Smith, E., Szidarovszky, F., Karnavas, W., & Bahill, T. (2008, February 21). Sensitivity analysis, a powerful system validation technique. The Open Cybernetics & Systemics Journal, 2(1), 39-56. https://doi.org/10.2174/1874110X 00802010039
[33]. Spencer, B. (2017, July 4). Fatal heart conditions are being misdiagnosed as stress: Six in ten patients with inherited illnesses had symptoms attributed to other causes. Daily Mail. Retrieved from http://www.dailymail. co.uk/news/article-4666032/Fatal-heart-conditions-misdiagnosed- stress.html
[34]. Spiegelhalter, D., Miles, J., & Jones, D. (2008). An introduction to Bayesian methods in health technology. The BMJ, 319(1). Retrieved from ncbi.nlm.nih.gov/pmc/ articles/PMC1116393
[35]. Subirats, I., Onyancha, I., Salokhe, G., & Keizer, J. (2003). Towards an architecture for open archive networks in agricultural sciences and technology [White paper]. Retrieved from Food and Agriculture Organization of the United Nations, Rome, Italy: www.fao.org/3/a-ah766e.pdf
[36]. Sun, G., Giles, C., Chen, H., & Lee, Y. (2017). The neural network pushdown automaton: Model, stack and learning simulations [White paper]. Retrieved from University of Maryland Institute for Advanced Computer Studies Laboratory for Plasma Research: https://arxiv.org/ abs/1711.05738
[37]. Tyson, J. (2001). Hashing algorithm. Retrieved from http://computer.howstuffworks.com/encryption5.html
[38]. Tetsche, F., Schneider, U., & Schleussner, E. (2016). Assessment of fetal maturation age by heart rate variability measures using random forest methodology. Computer Biology Medicine, 70(1), 157-62.
[39]. Werro, N. (2015). Fuzzy Classification of Online Customers. Fuzzy Management Methods. DOI 10.1007/978-3-319-15970-6_2
[40]. Wilson, E. (2013). Network architecture review checklist [Power Point slides]. Retrieved from https://www.slideshare.net/EberlyWilson/networkarchitecture- review-checklist